Transcription

2 Veritas Storage Foundation and HA Solutions HA and Disaster Recovery Solutions Guide for Microsoft SQL Server 2012 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Product version: Document version: Rev 1 Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Veritas, Veritas Storage Foundation, CommandCentral, NetBackup, Enterprise Vault, and LiveUpdate are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party ( Third Party Programs ). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. See the Third-party Legal Notices document for this product, which is available online or included in the base release media. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR and subject to restricted rights as defined in FAR Section "Commercial Computer Software - Restricted Rights" and DFARS , "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation

3 by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA

4 Technical Support Symantec Technical Support maintains support centers globally. Technical Support s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec s support offerings include the following: A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers automatic software upgrades protection Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services For information about Symantec s support offerings, you can visit our web site at the following URL: All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Contacting Technical Support Customers with a current support agreement may access Technical Support information at the following URL: Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: Product release level Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information

5 5 Problem description: Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support web page at the following URL: Customer service Customer service information is available at the following URL: Customer Service is available to assist with non-technical questions, such as the following types of issues: Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals

6 6 Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan Europe, Middle-East, and Africa North America and Latin America Documentation Your feedback on product documentation is important to us. Send suggestions for improvements and reports on errors or omissions. Include the title and document version (located on the second page), and chapter and section titles of the text on which you are reporting. Send feedback to: About Symantec Connect Symantec Connect is the peer-to-peer technical community site for Symantec s enterprise customers. Participants can connect and share information with other product users, including creating forum posts, articles, videos, downloads, blogs and suggesting ideas, as well as interact with Symantec product teams and Technical Support. Content is rated by the community, and members receive reward points for their contributions.

7 Contents Section 1 Chapter 1 Introduction and Concepts Introducing Veritas Storage Foundation and High Availability Solutions for Microsoft SQL Server About clustering solutions with SFW HA...18 About high availability...18 How a high availability solution works...19 How VCS monitors storage components...19 Shared storage if you use NetApp filers...20 Shared storage if you use SFW to manage cluster dynamic disk groups...20 Shared storage if you use Windows LDM to manage shared disks...21 Non-shared storage if you use SFW to manage dynamic disk groups...21 Non-shared storage if you use Windows LDM to manage local disks...22 Non-shared storage if you use VMware storage...22 How the Symantec High Availability solution works in a physical environment...23 About campus clusters...24 Differences between campus clusters and local clusters...24 Sample campus cluster configuration...24 What you can do with a campus cluster...26 About replication...27 About a replicated data cluster...27 How VCS replicated data clusters work...28 About disaster recovery...30 What you can do with a disaster recovery solution...30 What must be protected in an SQL Server environment...31 Typical SQL Server configuration in a VCS cluster...32 Typical SQL Server disaster recovery configuration...33 Where to get more information about Veritas Storage Foundation and High Availability Solutions for Microsoft SQL Server...34

10 10 Contents Installing Veritas Storage Foundation HA for Windows Installing SFW HA server components using the product installer Applying the selected installation and product options to multiple systems Installing the client components using the product installer Configuring disk groups and volumes for SQL Server About disk groups and volumes Prerequisites for configuring disk groups and volumes Considerations for a fast failover configuration Considerations for converting existing shared storage to cluster disk groups and volumes Considerations for disks and volumes for campus clusters Considerations for volumes for a VVR configuration Considerations for disk groups and volumes for multiple instances Sample disk group and volume configuration MSDTC sample disk group and volume configuration Viewing the available disk storage Creating a disk group Adding disks to campus cluster sites Creating volumes for high availability clusters Creating volumes for campus clusters About managing disk groups and volumes Importing a disk group and mounting a volume Unmounting a volume and deporting a disk group Adding drive letters to mount the volumes Configuring the cluster Configuring notification Adding a node to an existing VCS cluster Chapter 7 Installing SQL Server About installing and configuring SQL Server About installing multiple SQL Server instances Verifying that SQL Server databases and logs are moved to shared storage About installing SQL Server for high availability configuration About installing SQL Server on the first system About installing SQL Server on the second system Creating a SQL Server user-defined database Completing configuration steps in SQL Server Moving the tempdb database if using VVR for disaster recovery...175

11 Contents 11 Assigning ports for multiple SQL Server instances Enabling IPv6 support for the SQL Server Analysis Service Chapter 8 Chapter 9 Chapter 10 Configuring SQL Server for failover Configuring the VCS SQL Server service group Service group requirements for Active-Active configurations Prerequisites for configuring the SQL Server service group Creating the SQL Server service group Configuring the service group in a non-shared storage environment Assigning privileges to the existing SQL Server databases and logs Enabling fast failover for disk groups (optional) Verifying the SQL Server cluster configuration Configuring an MSDTC Server service group Prerequisites for MSDTC configuration Creating an MSDTC Server service group About configuring the MSDTC client for SQL Server About the VCS Application Manager utility Viewing DTC transaction information Modifying a SQL Server service group to add VMDg and MountV resources Determining additional steps needed Configuring campus clusters for SQL Server Tasks for configuring campus clusters Modifying the IP resource in the SQL Server service group Verifying the campus cluster: Switching the service group Setting the ForceImport attribute to 1 after a site failure Configuring Replicated Data Clusters for SQL Server Tasks for configuring Replicated Data Clusters Creating the primary system zone for the application service group Creating a parallel environment in the secondary zone Adding the systems in the secondary zone to the cluster Setting up security for VVR Configuring the VxSAS service Setting up the Replicated Data Sets (RDS) Prerequisites for setting up the RDS for the primary and secondary zones Creating the Replicated Data Sets with the wizard...223

12 12 Contents Configuring a RVG service group for replication Creating the RVG service group Configuring the resources in the RVG service group for RDC replication Configuring the IP and NIC resources Configuring the VMDg or VMNSDg resources Configuring the VMDg or VMNSDg resources for the disk group for the user-defined database Adding the VVR RVG resources for the disk groups Linking the VVR RVG resources to establish dependencies Deleting the VMDg or VMNSDg resource from the SQL Server service group Configuring the RVGPrimary resources Creating the RVG Primary resources Linking the RVG Primary resources to establish dependencies Bringing the RVG Primary resources online Configuring the primary system zone for the RVG service group Setting a dependency between the service groups Adding the nodes from the secondary zone to the RDC Adding the nodes from the secondary zone to the RVG service group Configuring secondary zone nodes in the RVG service group Configuring the RVG service group NIC resource for fail over (VMNSDg only) Configuring the RVG service group IP resource for failover Configuring the RVG service group VMNSDg resources for fail over Adding nodes from the secondary zone to the SQL Server service group Configuring the zones in the SQL Server service group Configuring the application service group IP resource for fail over (VMNSDg only) Configuring the application service group NIC resource for fail over (VMNSDg only) Verifying the RDC configuration Bringing the service group online Switching online nodes Additional instructions for GCO disaster recovery Chapter 11 Configuring disaster recovery for SQL Server Tasks for configuring disaster recovery for SQL Server...270

13 Contents 13 Tasks for setting up DR in a non-shared storage environment Guidelines for installing SFW HA and configuring the cluster on the secondary site Verifying your primary site configuration Setting up your replication environment Setting up security for VVR Requirements for EMC SRDF array-based hardware replication Software requirements for configuring EMC SRDF Replication requirements for EMC SRDF Requirements for Hitachi TrueCopy array-based hardware replication Software requirements for Hitachi TrueCopy Replication requirements for Hitachi TrueCopy Assigning user privileges (secure clusters only) Configuring disaster recovery with the DR wizard Cloning the storage on the secondary site using the DR wizard (VVR replication option) Creating temporary storage on the secondary site using the DR wizard (array-based replication) Installing and configuring SQL Server on the secondary site Cloning the service group configuration from the primary to the secondary site Configuring the SQL Server service group in a non-shared storage environment Configuring replication and global clustering Configuring VVR replication and global clustering Configuring EMC SRDF replication and global clustering Optional settings for EMC SRDF Configuring Hitachi TrueCopy replication and global clustering Optional settings for HTC Configuring global clustering only Creating the replicated data sets (RDS) for VVR replication Creating the VVR RVG service group for replication Configuring the global cluster option for wide-area failover Linking clusters: Adding a remote cluster to a local cluster Converting a local Exchange service group to a global service group Bringing a global service group online Verifying the disaster recovery configuration Establishing secure communication within the global cluster (optional) Adding multiple DR sites (optional) Recovery procedures for service group dependencies...330

17 Chapter 1 Introducing Veritas Storage Foundation and High Availability Solutions for Microsoft SQL Server This chapter contains the following topics: About clustering solutions with SFW HA on page 18 About high availability on page 18 How a high availability solution works on page 19 How VCS monitors storage components on page 19 How the Symantec High Availability solution works in a physical environment on page 23 About campus clusters on page 24 Differences between campus clusters and local clusters on page 24 Sample campus cluster configuration on page 24 What you can do with a campus cluster on page 26 About replication on page 27 About a replicated data cluster on page 27 How VCS replicated data clusters work on page 28 About disaster recovery on page 30 What you can do with a disaster recovery solution on page 30

18 18 Introducing Veritas Storage Foundation and High Availability Solutions for Microsoft SQL Server About clustering solutions with SFW HA What must be protected in an SQL Server environment on page 31 Typical SQL Server configuration in a VCS cluster on page 32 Typical SQL Server disaster recovery configuration on page 33 Where to get more information about Veritas Storage Foundation and High Availability Solutions for Microsoft SQL Server on page 34 About clustering solutions with SFW HA Veritas Storage Foundation High Availability for Windows (SFW HA) provides the following clustering solutions for high availability and disaster recovery: About high availability High availability failover cluster in an active-passive configuration on the same site Campus cluster in a two-node configuration with each node on a separate site Replicated data cluster with a primary zone and a secondary zone existing within a single cluster, which can stretch over two buildings or data centers connected with ethernet Wide area disaster recovery with a separate cluster on a secondary site, with replication support using Veritas Volume Replicator or hardware replication The term high availability refers to a state where data and applications are highly available because software or hardware is in place to maintain the continued functioning in the event of computer failure. High availability can refer to any software or hardware that provides fault tolerance, but generally the term has become associated with clustering. A cluster is a group of independent computers working together to ensure that mission-critical applications and resources are as highly available as possible. The group is managed as a single system, shares a common namespace, and is specifically designed to tolerate component failures and to support the addition or removal of components in a way that is transparent to users. Local clustering provides high availability through database and application failover. This solution provides local recovery in the event of application, operating system, or hardware failure, and minimizes planned and unplanned application downtime. The high availability solution includes procedures for installing and configuring clustered SQL Server environments using Veritas Storage Foundation High

19 Introducing Veritas Storage Foundation and High Availability Solutions for Microsoft SQL Server How a high availability solution works 19 Availability for Windows (SFW HA). SFW HA includes Veritas Storage Foundation for Windows (SFW) and Veritas Cluster Server (VCS). Setting up the clustered environment is also the first step in creating a wide-area disaster recovery solution using a secondary site. How a high availability solution works Keeping data and applications functioning 24 hours a day and seven days a week is the desired norm for critical applications today. Clustered systems have several advantages over standalone servers, including fault tolerance, high availability, scalability, simplified management, and support for rolling upgrades. Using Veritas Storage Foundation High Availability for Windows (SFW HA) as a local high availability solution paves the way for a wide-area disaster recovery solution in the future. A high availability solution is built on top of a backup strategy and provides the following benefits: Reduces planned and unplanned downtime. Serves as a local and wide-area failover (rather than load-balancing) solution. Enables failover between sites or between clusters. Manages applications and provides an orderly way to bring processes online and take them offline. Consolidates hardware in larger clusters. The HA environment accommodates flexible fail over policies, active-active configurations, and shared standby servers for SQL Server. How VCS monitors storage components VCS provides specific agents that monitor storage components and ensure that the shared disks, disk groups, LUNs, volumes, and mounts are accessible on the system where the application is running. Separate agents are available for shared and non-shared storage and for third-party storage arrays such as NetApp filers. Your storage configuration determines which agent should be used in the high availability configuration. For details on the various VCS storage agents, refer to the VCS Bundled Agents Reference Guide.

20 20 Introducing Veritas Storage Foundation and High Availability Solutions for Microsoft SQL Server How VCS monitors storage components Shared storage if you use NetApp filers The VCS hardware replication agents for NetApp provide failover support and recovery in environments that employ NetApp filers for storage and NetApp SnapMirror for replication. The agents enable configuring NetApp filers over an iscsi or Fibre Channel (FC) connection in a VCS cluster environment. The VCS agents for NetApp are as follows: NetAppFiler NetAppSnapDrive NetAppSnapMirror These agents monitor and manage the state of replicated filer devices and ensure that only one system has safe and exclusive access to the configured devices at a time. The agents can be used in local clusters, single VCS replicated data clusters, and multi-cluster environments that are set up using the VCS Global Cluster Option (GCO). In a typical configuration, the agents are installed on each system in the cluster. The systems are connected to the NetApp filers through a dedicated (private) storage network. VCS cluster systems are physically attached to the NetApp filer via an ethernet cable supporting iscsi or FC as the transport protocol. VCS also provides agents for other third-party hardware arrays. For details on the supported arrays, refer to the product Software Compatibility List (SCL). Shared storage if you use SFW to manage cluster dynamic disk groups The VCS MountV and VMDg agents are used to monitor shared storage that is managed using Storage Foundation for Windows (SFW). SFW manages storage by creating disk groups from physical disks. These disk groups are further divided into volumes that are mounted on the cluster systems.

21 Introducing Veritas Storage Foundation and High Availability Solutions for Microsoft SQL Server How VCS monitors storage components 21 The MountV agent monitors volumes residing on disk groups. The VMDg agent monitors cluster dynamic disk groups and is designed to work using SCSI reservations. Together the MountV and VMDg agents ensure that the shared cluster dynamic disk groups and volumes are available. Shared storage if you use Windows LDM to manage shared disks The VCS Mount and DiskReservation (DiskRes) agents are used to monitor shared disks that are managed using Windows Logical Disk Management (LDM). The Mount agent monitors basic disks and mount points and ensures that each system is able to access the volume or mount path in the same way. The DiskRes agent monitors shared disks and uses persistent reservation to ensure that only one system has exclusive access to the disks. During failovers, these agents ensure that the disks and volumes are deported and imported on the node where the application is running. Non-shared storage if you use SFW to manage dynamic disk groups VCS introduces the Volume Manager Non-Shared Diskgroup (VMNSDg) agent to support local non-shared storage configurations that are managed using SFW. The VMNSDg agent works without SCSI reservations and is designed for locally attached storage devices that do not support SCSI. The VMNSDg agent monitors and manages the import and deport of dynamic disk groups created on local storage. The only difference between the VMDg agent and the VMNSDg agent is that the VMDg agent is designed for shared cluster dynamic disk groups and uses SCSI reservations, whereas the VMNSDg agent supports only non-shared local dynamic disk groups and works without SCSI reservations. The VMNSDg agent can be used to set up single node Replicated Data Clusters (RDC) or Disaster Recovery (DR) configurations with replication set up between the sites. During a failover, the VCS MountV and VMNSDg agents deport the locally attached storage from the affected node and then import the locally attached storage of the target node. Replication ensures that the data is consistent and the application is up and running successfully. Note: The VMNSDg agent does not support fast failover and Intelligent Monitoring Framework (IMF).

Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

Symantec Security Information Manager - Best Practices for Selective Backup and Restore Symantec Security Information Manager - Best practices for selective backup and restore The software described in

Symantec NetBackup Vault Operator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup Vault Operator's Guide The software described in this book is furnished under a license agreement and may

Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

TM Symantec NetBackup Desktop and Laptop Option README Release 6.1 MP7 2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms

Symantec Security Information Manager 4.8 Release Notes Symantec Security Information Manager 4.8 Release Notes The software described in this book is furnished under a license agreement and may be used

Cluster Server Configuration Guide for Custom Application Windows 7.0 June 2015 Cluster Server Configuration Guide for Custom Application The software described in this book is furnished under a license

Symantec Protection Center Enterprise 3.0 Release Notes Symantec Protection Center Enterprise 3.0 Release Notes The software described in this book is furnished under a license agreement and may be used

Symantec Critical System Protection Agent Event Viewer Guide Symantec Critical System Protection The software described in this book is furnished under a license agreement and may be used only in accordance

PGP CAPS Activation Package Administrator's Guide 9.12/10.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

Symantec Protection Engine for Cloud Services 7.0 Release Notes Symantec Protection Engine for Cloud Services Release Notes The software described in this book is furnished under a license agreement and

Symantec NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for Lotus Notes Administrator's Guide The software described in this book is furnished

Symantec Client Firewall Policy Migration Guide Symantec Client Firewall Policy Migration Guide The software described in this book is furnished under a license agreement and may be used only in accordance

Symantec Event Collector 4.3 for Microsoft Windows Quick Reference Symantec Event Collector for Microsoft Windows Quick Reference The software described in this book is furnished under a license agreement

Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

Symantec NetBackup for Hyper-V Administrator's Guide Release 7.5 21220062 Symantec NetBackup for Hyper-V Guide The software described in this book is furnished under a license agreement and may be used

Symantec Event Collector for Kiwi Syslog Daemon version 3.7 Quick Reference Symantec Event Collector for Kiwi Syslog Daemon Quick Reference The software described in this book is furnished under a license

PGP Desktop Version 10.2 for Mac OS X Maintenance Pack Release Notes Thank you for using this Symantec Corporation product. These Release Notes contain important information regarding this release of PGP

Symantec NetBackup for NDMP Administrator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for NDMP Administrator's Guide The software described in this book is furnished under a license

Symantec Enterprise Vault Upgrading to Enterprise Vault 11.0.1 Symantec Enterprise Vault: Upgrading to Enterprise Vault 11.0.1 The software described in this book is furnished under a license agreement

Symantec NetBackup for DB2 Administrator's Guide UNIX, Windows, and Linux Release 7.5 Symantec NetBackup for DB2 Administrator's Guide The software described in this book is furnished under a license agreement

Symantec ApplicationHA 6.2 User's Guide - Solaris on Oracle VM Server for SPARC November 2014 Symantec ApplicationHA User's Guide The software described in this book is furnished under a license agreement

Altiris Asset Management Suite 7.1 from Symantec User Guide Altiris Asset Management Suite 7.1 from Symantec User Guide The software described in this book is furnished under a license agreement and may

Symantec NetBackup for Enterprise Vault Agent Administrator's Guide for Windows Release 7.6 The software described in this book is furnished under a license agreement and may be used only in accordance

Symantec Enterprise Vault Reporting 10.0 Symantec Enterprise Vault: Reporting The software described in this book is furnished under a license agreement and may be used only in accordance with the terms